{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:28:15Z","timestamp":1747805295381,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642152566"},{"type":"electronic","value":"9783642152573"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15257-3_16","type":"book-chapter","created":{"date-parts":[[2010,8,4]],"date-time":"2010-08-04T19:12:58Z","timestamp":1280949178000},"page":"173-186","source":"Crossref","is-referenced-by-count":13,"title":["On-the-fly Inlining of Dynamic Security Monitors"],"prefix":"10.1007","author":[{"given":"Jonas","family":"Magazinius","sequence":"first","affiliation":[]},{"given":"Alejandro","family":"Russo","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)","DOI":"10.1109\/CSF.2009.22"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS) (June 2009)","DOI":"10.1145\/1554339.1554353"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In: Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS) (June 2010)","DOI":"10.1145\/1814217.1814220"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-642-01465-9_2","volume-title":"Formal Aspects in Security and Trust","author":"G. Boudol","year":"2009","unstructured":"Boudol, G.: Secure information flow as a safety property. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol.\u00a05491, pp. 20\u201334. Springer, Heidelberg (2009)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Chudnov, A., Naumann, D.A.: Information flow monitor inlining. In: Proc. IEEE Computer Security Foundations Symposium (July 2010)","DOI":"10.1109\/CSF.2010.21"},{"key":"16_CR6","first-page":"297","volume-title":"Foundations of Secure Computation","author":"E.S. Cohen","year":"1978","unstructured":"Cohen, E.S.: Information transmission in sequential programs. In: DeMillo, R.A., Dobkin, D.P., Jones, A.K., Lipton, R.J. (eds.) Foundations of Secure Computation, pp. 297\u2013335. Academic Press, London (1978)"},{"key":"16_CR7","unstructured":"Crockford, D.: Making javascript safe for advertising (2009), adsafe.org"},{"issue":"7","key":"16_CR8","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"key":"16_CR9","unstructured":"Eich, B.: Flowsafe: Information flow security for the browser (October 2009), https:\/\/wiki.mozilla.org\/FlowSafe"},{"key":"16_CR10","unstructured":"Erlingsson, U.: The inlined reference monitor approach to security policy enforcement. PhD thesis, Cornell University, Ithaca, NY, USA (2004)"},{"key":"16_CR11","unstructured":"Facebook. FBJS (2009), http:\/\/wiki.developers.facebook.com\/index.php\/FBJS"},{"issue":"2","key":"16_CR12","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1093\/comjnl\/17.2.143","volume":"17","author":"J.S. Fenton","year":"1974","unstructured":"Fenton, J.S.: Memoryless subsystems. Computing J\u00a017(2), 143\u2013147 (1974)","journal-title":"Computing J"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proc. IEEE Symp. on Security and Privacy, April 1982, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"issue":"1","key":"16_CR14","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"K.W. Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM TOPLAS\u00a028(1), 175\u2013205 (2006)","journal-title":"ACM TOPLAS"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.-T., Kuo, S.-Y.: Securing web application code by static analysis and runtime protection. In: Proc. International Conference on World Wide Web, May 2004, pp. 40\u201352 (2004)","DOI":"10.1145\/988672.988679"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/3-540-48340-3_26","volume-title":"Mathematical Foundations of Computer Science 1999","author":"D. Kozen","year":"1999","unstructured":"Kozen, D.: Language-based security. In: Kuty\u0142owski, M., Wierzbicki, T., Pacholski, L. (eds.) MFCS 1999. LNCS, vol.\u00a01672, pp. 284\u2013298. Springer, Heidelberg (1999)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Le Guernic, G.: Automaton-based confidentiality monitoring of concurrent programs. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 218\u2013232 (2007)","DOI":"10.1109\/CSF.2007.10"},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues","author":"G. Le Guernic","year":"2008","unstructured":"Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol.\u00a04435. Springer, Heidelberg (2008)"},{"issue":"3\u20134","key":"16_CR19","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1025055424017","volume":"30","author":"X. Leroy","year":"2003","unstructured":"Leroy, X.: Java bytecode verification: algorithms and formalizations. J. Automated Reasoning\u00a030(3\u20134), 235\u2013269 (2003)","journal-title":"J. Automated Reasoning"},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J. Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security\u00a04, 2\u201316 (2005)","journal-title":"International Journal of Information Security"},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-04444-1_31","volume-title":"Computer Security \u2013 ESORICS 2009","author":"S. Maffeis","year":"2009","unstructured":"Maffeis, S., Mitchell, J., Taly, A.: Isolating javaScript with filters, rewriting, and wrappers. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 505\u2013522. Springer, Heidelberg (2009)"},{"key":"16_CR22","volume-title":"Proc. of CSF\u201909","author":"S. Maffeis","year":"2009","unstructured":"Maffeis, S., Taly, A.: Language-based isolation of untrusted Javascript. In: Proc. of CSF\u201909. IEEE, Los Alamitos (2009), See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3 (2009)"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Magazinius, J., Askarov, A., Sabelfeld, A.: A lattice-based approach to mashup security. In: Proc. ACM Symposium on Information, Computer and Communications Security (ASIACCS) (April 2010)","DOI":"10.1145\/1755688.1755691"},{"key":"16_CR24","unstructured":"Magazinius, J., Russo, A., Sabelfeld, A.: Inlined security monitor performance test (2010), http:\/\/www.cse.chalmers.se\/~d02pulse\/inlining\/"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity. In: Proc. ACM SIGPLAN Conference on Programming language Design and Implementation, pp. 193\u2013205 (2008)","DOI":"10.1145\/1379022.1375606"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: Proc. IEEE Symp. on Security and Privacy, May 1994, pp. 79\u201393 (1994)","DOI":"10.1109\/RISP.1994.296590"},{"key":"16_CR27","unstructured":"Miller, M., Samuel, M., Laurie, B., Awad, I., Stay, M.: Caja: Safe active content in sanitized javascript (2008)"},{"key":"16_CR28","unstructured":"Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif: Java information flow. Software release (July 2001), http:\/\/www.cs.cornell.edu\/jif"},{"issue":"3","key":"16_CR29","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1281480.1281481","volume":"1","author":"C. Reis","year":"2007","unstructured":"Reis, C., Dunagan, J., Wang, H.J., Dubrovsky, O., Esmeir, S.: Browsershield: Vulnerability-driven filtering of dynamic html. ACM Trans. Web\u00a01(3), 11 (2007)","journal-title":"ACM Trans. Web"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A.: Securing timeout instructions in web applications. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)","DOI":"10.1109\/CSF.2009.16"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A.: Dynamic vs. static flow-sensitive security analysis. In: Proc. IEEE Computer Security Foundations Symposium (July 2010)","DOI":"10.1109\/CSF.2010.20"},{"key":"16_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-04444-1_6","volume-title":"Computer Security \u2013 ESORICS 2009","author":"A. Russo","year":"2009","unstructured":"Russo, A., Sabelfeld, A., Chudnov, A.: Tracking information flow in dynamic tree structures. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 86\u2013103. Springer, Heidelberg (2009)"},{"issue":"1","key":"16_CR33","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"16_CR34","series-title":"Lecture Notes in Computer Science","volume-title":"Proc. Andrei Ershov International Conference on Perspectives of System Informatics","author":"A. Sabelfeld","year":"2009","unstructured":"Sabelfeld, A., Russo, A.: From dynamic to static and back: Riding the roller coaster of information-flow control research. In: Proc. Andrei Ershov International Conference on Perspectives of System Informatics. LNCS. Springer, Heidelberg (2009)"},{"issue":"1","key":"16_CR35","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Transactions on Information and System Security\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"16_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-44577-3_6","volume-title":"Informatics\u201410 Years Back, 10 Years Ahead","author":"F.B. Schneider","year":"2001","unstructured":"Schneider, F.B., Morrisett, G., Harper, R.: A language-based approach to security. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol.\u00a02000, pp. 86\u2013101. Springer, Heidelberg (2001)"},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Shroff, P., Smith, S., Thober, M.: Dynamic dependency monitoring to secure information flow. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 203\u2013217 (2007)","DOI":"10.1109\/CSF.2007.20"},{"key":"16_CR38","unstructured":"Simonet, V.: The Flow Caml system. Software release (July 2003), http:\/\/cristal.inria.fr\/~simonet\/soft\/flowcaml"},{"key":"16_CR39","unstructured":"P.H.I. Systems: Sparkada examinar. Software release, http:\/\/www.praxis-his.com\/sparkada\/"},{"key":"16_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11547662_24","volume-title":"Static Analysis","author":"T. Terauchi","year":"2005","unstructured":"Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol.\u00a03672, pp. 352\u2013367. Springer, Heidelberg (2005)"},{"key":"16_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/11935308_24","volume-title":"Information and Communications Security","author":"V.N. Venkatakrishnan","year":"2006","unstructured":"Venkatakrishnan, V.N., Xu, W., DuVarney, D.C., Sekar, R.: Provably correct runtime enforcement of non-interference properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 332\u2013351. Springer, Heidelberg (2006)"},{"key":"16_CR42","unstructured":"Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proc. Network and Distributed System Security Symposium (February 2007)"},{"key":"16_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-48294-6_20","volume-title":"Static Analysis","author":"D. Volpano","year":"1999","unstructured":"Volpano, D.: Safety versus secrecy. In: Cortesi, A., Fil\u00e9, G. (eds.) SAS 1999. LNCS, vol.\u00a01694, pp. 303\u2013311. Springer, Heidelberg (1999)"},{"issue":"3","key":"16_CR44","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D. Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. J. Computer Security\u00a04(3), 167\u2013187 (1996)","journal-title":"J. Computer Security"},{"issue":"4","key":"16_CR45","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1145\/363516.363520","volume":"9","author":"D.S. Wallach","year":"2000","unstructured":"Wallach, D.S., Appel, A.W., Felten, E.W.: The security architecture formerly known as stack inspection: A security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology\u00a09(4), 341\u2013378 (2000)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"16_CR46","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3054.001.0001","volume-title":"The Formal Semantics of Programming Languages: An Introduction","author":"G. Winskel","year":"1993","unstructured":"Winskel, G.: The Formal Semantics of Programming Languages: An Introduction. MIT Press, Cambridge (1993)"}],"container-title":["IFIP Advances in Information and Communication Technology","Security and Privacy \u2013 Silver Linings in the Cloud"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15257-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T20:29:09Z","timestamp":1740342549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15257-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642152566","9783642152573"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15257-3_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2010]]}}}